The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management information system decision on sensitive data in cloud.
Massive multiple-input multiple-output (m-MIMO) is considered as an essential technique to meet the high data rate requirements of future sixth generation (6G) wireless communications networks. The vast majority of m-MIMO research has assumed that the channels are uncorrelated. However, this assumption seems highly idealistic. Therefore, this study investigates the m-MIMO performance when the channels are correlated and the base station employs different antenna array topologies, namely the uniform linear array (ULA) and uniform rectangular array (URA). In addition, this study develops analyses of the mean square error (MSE) and the regularized zero-forcing (RZF) precoder under imperfect channel state information (CSI) and a realist
... Show MoreEnvironmental Control Systems form one of the integral tasks of the designer, resulting from his/her acquaintance with the nature of sites and the way they are deployed to achieve modern space entity which is witnessing significant development in the field of interior design.Good deployment of these systems offer us, as designers, high potential and several varied solutions to configure internal spaces characterised as a fertile field of study and knowledge.The research problem was identified in the marginalisation of the importance of Environmental Control Systems as an important designing factor to achieve integrated design. The research problem was demonstrated in Chapter One, along with defining the objectives and formulating
Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha
... Show MoreSewage pumping stations are considered an important part of any sewerage system. Pumps failure in these stations means that the pumps are unable to work at the design requirement (flow capacity and head) and that may cause sewer overflow and flooding leading to sewer deterioration. In this paper, two main sewage pumping stations in Baghdad city were selected as case studies, Al- Habibia and Al-Ghazali located on Zublin trunk sewer 3000 mm and Baghdad trunk sewer 1200-2100 respectively. This study focused mainly on the operation of main sewage pumping stations and their effect, both directly and indirectly, on changing hydraulic properties, which leads to an increase in the deterioration of sewage pipes. The hydraulic analysis was co
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MorePurpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Let be an n-Banach space, M be a nonempty closed convex subset of , and S:M→M be a mapping that belongs to the class mapping. The purpose of this paper is to study the stability and data dependence results of a Mann iteration scheme on n-Banach space
Objectives: To assess nurses-midwives' knowledge about pain management during labor before and after implementation of educational program and to determine the effectiveness of educational program on nurses-midwives' knowledge about pain management during labor in Baghdad Maternity Hospitals.
Methodology: A quasi-experimental design has been conducted during the period of (February 27th 2019 through 2nd June 2019) on non-probability sample (purposive) consists of (44 Nurses/midwives') who are work in delivery room, the sample was exposed to pretest, educational program, posttest. The study was conducted in three Directories, (Baghdad Teaching Hospital) at medical city health
... Show MoreThe aim of this research is to measure and analyze the gap between the actual reality and the requirements of the environmental management system in the middle refineries company/refinery cycle according to ISO14001: 2015, as well as to measure the availability of a clean production strategy and test the relationship and impact between the availability of the requirements of the standard and a clean production strategy for the actual reality in the company.
The research problem was determined by the extent to which the requirements of the environmental management system are applied according to ISO14001: 2015 in the middle refineries company? To what extent are the required clean production strategies ava
... Show More